Full Disclosure mailing list archives
Re: Dig SCO?
From: Steve Menard <smenard () nbnet nb ca>
Date: Mon, 02 Feb 2004 10:52:17 -0400
they have moved to www.thescogroup.com Here is their Partner Alert from Monday AM ;-) From - Mon Feb 2 10:00:48 2004 X-UIDL: -==-=-=-=-=-=-=-=-=-=-=- X-Mozilla-Status: 0001 X-Mozilla-Status2: 00000000 Return-Path: <TeamSCO () sco rsc01 com> Received: from om-thescogroup.rgc3.net ([66.35.244.29]) by simmts1-srv.bellnexxia.net(InterMail vM.5.01.06.05 201-253-122-130-105-20030824) with ESMTP id <20040202130902.PTTS5069.xxxxx.xx.x.x.x () om-thescogroup rgc3 net>
for <XXXX () XXX XX>; Mon, 2 Feb 2004 08:09:02 -0500Received: by om-thescogroup.rgc3.net id XXXXXX; Mon, 2 Feb 2004 05:09:02 -0800 (envelope-from <TeamSCO () sco rsc01 com>)
MIME-Version: 1.0 Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable Date: Mon, 2 Feb 2004 05:09:02 -0800 From: "SCO Partner Program" <TeamSCO () sco rsc01 com> Reply-To: "SCO Partner Program" <partners () sco com> Subject: SCO Partner Alert - MyDoom and Novarg Work-Arounds X-cid: caldera.XXXX.X To: XXXXX () XXXX XX Message-Id: <20040202130902.PTTSXXX9.XXXXX () om-thescogroup rgc3 net> SCO Partner Alert: * Mydoom or Novarg Virus Work-arounds * Mirrored availability of SCO Web site at http://www.thescogroup.comAs you are probably aware, on Monday, January 26, a computer virus called Mydoom (Network Associates' name) or Novarg (Symantec's name) spread quickly across the Internet. Antivirus companies have determined that this worm is coded such that computers infected with the Mydoom variant are set to conduct a distributed denial of service (DDOS) attack against www.sco.com from February 1 - 12.
In short, the virus is activated when users open an innocent-looking e-mail message that contains an attached program file (with a .bat, .cmd, .exe, .pif, .scr, or .zip extension) which then accesses the user's e-mail address book and sends itself to all of that user's contacts. The offending e-mail message usually arrives with a subject line such as "Test," "Hi," or "Mail Transaction Failed."
The SCO Group boldly condemns this latest action, and is taking several active steps to fight against acts of cyber-terrorism such as that launched by the creator(s) of the Mydoom virus.
* On January 27, SCO announced that we are offering a reward of up to a total of $250,000 for information leading to the arrest and conviction of the individual(s) responsible for creating the Mydoom virus.
* SCO is working closely with U.S. law enforcement authorities including the U.S. Secret Service and the Federal Bureau of Investigation (FBI) to determine the identity of the Mydoom creator(s)
* SCO is launching a "mirrored" Web site (which will provide all of the information currently available at www.sco.com) to continue business as usual with partners and customers - see http://www.thescogroup.com
As a valued SCO Solution Provider, your uninterrupted, successful SCO UNIX business is important to us. If you are unable to connect to the information or resources that you need during the targeted dates of the Mydoom virus, please contact SCO right away. For general issues, you can call 1-800-SCO-UNIX or e-mail SCO at partners () sco com. For sales specific concerns, you can call our Inside Sales team at 1-800-726-6561.
Thank you for your continued support, Darl McBride President & CEO The SCO Group _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Dig SCO? Robert Guess (Feb 02)
- Re: Dig SCO? Mary Landesman (Feb 02)
- Re: Dig SCO? Steve Menard (Feb 02)
- Re: Dig SCO? dietz (Feb 02)
- Re: Dig SCO? James Bliss (Feb 02)
- Re: Dig SCO? Valdis . Kletnieks (Feb 02)
- Re: Dig SCO? James Bliss (Feb 02)
- Re: Dig SCO? James Bliss (Feb 02)
- <Possible follow-ups>
- RE: Dig SCO? John . Airey (Feb 03)